In a sensor network, energy consumption is one of the major constraints. Keeping this in mind, what factors would one consider when designing a security scheme for such networks? Explain.
What will be an ideal response?
Following are the factors that have to be kept in mind:
(a) The scheme should not involve expensive operations like modular
exponentiation etc.
(b) Public key and signature schemes should be avoided.
(c) Hash functions (even though there is no one-to-one correspondence) are nonexpensive and should be used as much as possible
(d) Message overhead should be kept to the minimal
(e) The protocol should have a very small state diagram in order to limit the code used for its implementation.
You might also like to view...
How can humidification be provided in residences that do not have heating equipment with ductwork?
What will be an ideal response?
In the traditional project delivery system, the capital projects officer is concerned primarily with the disbursement of funds for the project.
Answer the following statement true (T) or false (F)
Which language is a "high-level" language?
A) assembly language B) machine code C) BASIC language D) DOS
All of the welding symbols are used in conjunction with each other in a manner that will provide all the necessary information to perform the correct weld and ____.
A. color B. finish C. area D. temperature